Research data often have special security requirements. This presentation will show a framework for categorizing and implementing these special requirements. Restricted-use research data can contain sensitive information as well as personally identifiable information (PII). Sensitive data can cause harm, place in legal jeopardy or damage reputation. PII can lead to disclosure of individuals in research data. Even when PII may have been removed or masked, re-identification may still be possible through inference and linkages. Researchers and institutions are obligated to protect these data. In some circumstances, legal mandates exist. OUTCOMES: Awareness of the special security needs of research and how they differ Learn what options are ...
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) contains provisions that hav...
This project explores the options for access to sensitive data sets; what authentication technologie...
Repository managers can never be one hundred percent sure of the security of hosted research data. E...
A number of federal agencies and research organizations distribute special files to investigators on...
The required security for secondary research-data depends on their sensitivity and identifiableness....
This talk will illustrate a new area of service support for academic research data services: privacy...
Biomedical researchers collect large amounts of personal data about individuals, which are frequentl...
As researchers consider making their data available to others, they are concerned with the responsib...
Researchers often require and collect sensitive information about individuals to answer important sc...
As researchers consider making their data available to others, they are concerned with the responsib...
In research academic computing, may be natural to emphasize data integrity over confidentiality. Ho...
Political science research in both qualitative and quantitative traditions frequently uses data that...
Presentation given at the joint seminar of the Center for Economic Studies and Center for Disclosure...
De-identification methods have helped government organizations provide the public with useful inform...
This project explores the options for access to sensitive data sets; what authentication technologie...
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) contains provisions that hav...
This project explores the options for access to sensitive data sets; what authentication technologie...
Repository managers can never be one hundred percent sure of the security of hosted research data. E...
A number of federal agencies and research organizations distribute special files to investigators on...
The required security for secondary research-data depends on their sensitivity and identifiableness....
This talk will illustrate a new area of service support for academic research data services: privacy...
Biomedical researchers collect large amounts of personal data about individuals, which are frequentl...
As researchers consider making their data available to others, they are concerned with the responsib...
Researchers often require and collect sensitive information about individuals to answer important sc...
As researchers consider making their data available to others, they are concerned with the responsib...
In research academic computing, may be natural to emphasize data integrity over confidentiality. Ho...
Political science research in both qualitative and quantitative traditions frequently uses data that...
Presentation given at the joint seminar of the Center for Economic Studies and Center for Disclosure...
De-identification methods have helped government organizations provide the public with useful inform...
This project explores the options for access to sensitive data sets; what authentication technologie...
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) contains provisions that hav...
This project explores the options for access to sensitive data sets; what authentication technologie...
Repository managers can never be one hundred percent sure of the security of hosted research data. E...